Translate

Monday, November 29, 2010

CYBERBULLYING AND WHAT IT IS

CYBERBULLYING AND WHAT IT IS:


Gone are the days when a child’s home was a refuge from playground or neighborhood 
bullies. The Internet is the new playground, and there are no off-hours. Tech-savvy 
students are turning to cyberspace to harass their peers using a new method of bullying
—cyberbullying, which is willful and repeated harm (i.e. harassing, humiliating, or 
threatening text or images) inflicted through the Internet, interactive technologies 
or mobile phones. There is no escape from those who are being cyberbullied— kids can 
be bullied anytime, anywhere. 

Get the Discussion Started: 
Information you can glean from your child’s online use will help to ensure a safer 
online environment for your child. 

Ask your child: 
  • Are your profiles set to private?
  • Would it be easy for someone to track you down?
  • How many online “friends” do you have?
  • What kind of information do you consider safe? Unsafe?
  • Have you posted anything that you wouldn’t want your school assembly to see?
  • What messages do your pictures and postings portray?
  • Have you been contacted by a stranger?
  • Have your friends ever put themselves at risk? If so, what did you do about it?
  • Have you ever said/posted anything online you wish you could take back?
  • Has anyone ever hurt your feelings by anything they posted about you online?


Forty three percent of teens aged 13 to 17 report that they have experienced some sort 
of cyberbullying in the past year! 


Cyberbullying Tactics Gossip:

Posting or sending cruel gossip to damage a person’s reputation and relationships with 
friends, family and acquaintances Exclusion: Deliberately excluding someone from an 
online group;

Impersonation: Breaking into someone’s email or other online account and sending 
messages that will cause embarrassment or damage to the person’s reputation and affect 
his/her relationship with others;
 
Harassment: Repeatedly posting or sending offensive, rude, and insulting messages;
 
Cyber-stalking: Posting or sending unwanted or intimidating messages, which may 
include threats;
 
Flaming: Online fights where scornful and offensive messages are posted on 
websites, forums, or blogs;
 
Outing and Trickery: Tricking someone into revealing secrets or embarrassing 
information, which is then shared online;

Cyber-threats: Remarks on the Internet threatening or implying violent behavior, 
displaying suicidal tendencies. 



What can parents do?

Do not erase or delete messages from cyberbullies. Your children do not have to read the
messages they receive from bullies, but they (or you) do need to keep messages as
evidence. To report cyberbullying, it is important to save as much info as you can. 
The more you save, the easier it will be to track down the people that are bothering 
your child. (Save the email, email address, date and time received, copies of all 
relevant emails, screenshots, etc.). And parents should use software to block bullies 
if they encounter them through chat or IM and use privacy settings on social networking
pages. Tell your children they do not have to accept any Cyberbullying victims experience
online activity that is meant to intimidate, threaten, tease or harm them or anyone else.
Giving bullies the same negative effects as attention is exactly what they want, so 
ignore them as those bullied “offline.” 

Encourage your children to talk to you if anybody says or does something online that 
makes them feel some cases, school violence or uncomfortable or threatened.

Stay calm and keep open lines of communication with your children. Make sure you or 
your children tell their school if the bullying is school related or involves another 
student. If you or made public online for an your children are threatened with harm, 
contact your unlimited audience to view. 

Watch out for warnings signs, such as reluctance to use the computer, a change in 
your child's behavior and mood, or reluctance to go to school. 

Tell your children to guard their contact information. Children should assume that 
people will use the information on their profile to cause them harm. Tell your 
children that they should not put anything online that they wouldn't want their 
worst enemy to find out about. Remind your children that the people they befriend 
online have open access to all of their posted content and information and they can 
forward or use any of that information against them. 

Remind your children that those who bully want to make their victims feel as if there 
is something wrong with them, but victims should know that there is nothing wrong with 
them; it is the bullies who have the real problem. 

-Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)